General

  • Target

    Swoofer.exe

  • Size

    8.6MB

  • Sample

    241024-y3anhsshrd

  • MD5

    290e1a8e3ea8371b051f2fcbc857965d

  • SHA1

    f39373d5db77d97639e40fe96025a20005e79435

  • SHA256

    b73ed9bf5d6c697cf0908b4152a7ed0f4b0e3f9005df6223b20634f0def23ef4

  • SHA512

    cce56ca9f9de4b1a5f6d9290aeba5f206601fd5705e22db50e12d1341dc7fab3f2b8daa35b47fac66336685c9acb5cb5b1932147f3984a3bf0585da50e41de04

  • SSDEEP

    196608:he0rDReNTfm/pf+xk4dWRptrbWOjgrE36vEQ:Uy/pWu4kRptrbvMrEqvEQ

Malware Config

Targets

    • Target

      Swoofer.exe

    • Size

      8.6MB

    • MD5

      290e1a8e3ea8371b051f2fcbc857965d

    • SHA1

      f39373d5db77d97639e40fe96025a20005e79435

    • SHA256

      b73ed9bf5d6c697cf0908b4152a7ed0f4b0e3f9005df6223b20634f0def23ef4

    • SHA512

      cce56ca9f9de4b1a5f6d9290aeba5f206601fd5705e22db50e12d1341dc7fab3f2b8daa35b47fac66336685c9acb5cb5b1932147f3984a3bf0585da50e41de04

    • SSDEEP

      196608:he0rDReNTfm/pf+xk4dWRptrbWOjgrE36vEQ:Uy/pWu4kRptrbvMrEqvEQ

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks